2011 | OriginalPaper | Buchkapitel
Ceremony Analysis: Strengths and Weaknesses
verfasst von : Kenneth Radke, Colin Boyd, Juan Gonzalez Nieto, Margot Brereton
Erschienen in: Future Challenges in Security and Privacy for Academia and Industry
Verlag: Springer Berlin Heidelberg
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
We investigate known security flaws in the context of security ceremonies to gain an understanding of the ceremony analysis process. The term security
ceremonies
is used to describe a system of protocols and humans which interact for a specific purpose. Security ceremonies and ceremony analysis is an area of research in its infancy, and we explore the basic principles involved to better understand the issues involved. We analyse three ceremonies, HTTPS, EMV and Opera Mini, and use the information gained from the experience to establish a list of typical flaws in ceremonies. Finally, we use that list to analyse a protocol proven secure for human use. This leads to a realisation of the strengths and weaknesses of ceremony analysis.